Hearings

Jun 23, 2016

Radicalization in the U.S. and the Rise of Terrorism

PURPOSE: To address the scope of radicalization, and assess what steps can be taken to mitigate the rise of terror via lone wolf attacks and organized terrorist plots. BACKGROUND: The terrorist attacks in Brussels in March 2016 which claimed the lives of more than 30 people, sent shockwaves throughout the world. This attack followed the attacks in Paris on November 13, 2015 where 130 lives were lost. Earlier ...

Jun 23, 2016

Examining EPA’s Proposed Groundwater Rule for In-Situ Uranium Recovery

PURPOSE: To examine the proposed rule and how it impacts states, federal agencies, and the in-situ recovery industry. To examine how the Environmental Protection Agency (EPA) can best move forward with the rule, including ways it can work with impacted groups. BACKGROUND: On January 26, 2015, EPA issued a proposed rule entitled “Health and Environmental Protection Standards for Uranium and Thorium Mill ...

Jun 20, 2016

Federal Efforts to Improve Cybersecurity

PURPOSE: To hear private sector views on cyber threats, priority issues for cybersecurity strategy, implementation of the Cybersecurity Act of 2015, and issues the Commission on Enhancing National Cybersecurity should consider. BACKGROUND: On December 18, 2015, Congress enacted the Cybersecurity Act to achieve three key goals: (1) create a framework for private companies to share cybersecurity threat ...

Jun 16, 2016

POSTPONED – Date TBD – Firearms and Munitions at Risk: Examining Inadequate Safeguards

PURPOSE: To examine agency procedures for accounting for and controlling firearms inventory, and to explore how these practices can be improved. To discuss why the agencies have failed to produce responsive documents per the Committee’s request. BACKGROUND: Chairman Chaffetz sent a letter to numerous agencies earlier this year including Department of Homeland Security (DHS), the Bureau of Land Management ...

Jun 14, 2016

Oversight of the National Park Service

TAKEAWAYS: More than 20 claims of sexual harassment and misconduct were reported at offices in the Grand Canyon River District and Canaveral National Seashore during the past 15 years. Yet, ...

Jun 10, 2016

18F and U.S. Digital Service Oversight

PURPOSE: To examine the roles of 18F and US Digital Service (USDS) in providing IT services to federal agencies and to evaluate how closely they adhere to their original purpose. To explore how they protect against overlap and duplication, measure results, and interact with agency CIOs. BACKGROUND: In March 2014, General Services Administration announced the creation of a new digital government program called ...

Jun 9, 2016

SNAP: Examining Efforts to Combat Fraud and Improve Program Integrity

PURPOSE: To examine federal and state efforts to combat fraud and trafficking in the Supplemental Nutrition Assistance Program (SNAP) program. BACKGROUND: In FY 2015, SNAP provided 46 million low-income individuals and/or households with $69 billion in benefits to help provide for a more nutritious diet. The Office of Management and Budget designated SNAP as a high-error program due to an estimated $2.6 billion ...

Jun 9, 2016

Census 2020: Examining the Readiness of Key Aspects of the Census Bureau’s 2020 Census Preparation

TAKEAWAYS: Significant changes are needed at the Census Bureau to prevent massive cost overruns with Census 2020. Mismanagement is a problem at the Bureau. As the 2018 end-to-end test deadline draws closer, there are still 178 decisions for management to make to ensure readiness of the modernized system. The Bureau must narrowly focus and hasten IT modernization efforts in order prevent cost overruns and meet Census 2020's immutable time ...

May 26, 2016

Social Security Administration: Information Systems Review

TAKEAWAYS: Twice, SSA failed to detect penetration tests even though the tests were designed to be detected. Auditors were able to obtain global access privileges, and access Personal Identifiable Information (PII) and other sensitive information. An FY2015 IG audit found weaknesses in SSA’s networks representing severe security vulnerabilities and constituting a significant deficiency under the Federal Information Security Management Act ...

May 25, 2016

Federal Agencies’ Reliance on Outdated and Unsupported Information Technology: A Ticking Time Bomb

TAKEAWAYS: The federal government spends the majority of its $80 billion technology budget on maintaining and operating legacy systems. Legacy information technology (IT) systems result in higher costs and ...